Page 4,129«..1020..4,1284,1294,1304,131..4,1404,150..»

How and where do I report Cryptocurrency coin-to-coin …

Follow these steps in the Premier Edition:

OR if the jump-to link is not working

Pleasesee this FAQ with more details:

Reporting cryptocurrency is similar to reporting a stock sale. You'll need to report your cryptocurrency if you sold, exchanged, spent or converted it.

You have to do this for every trade you made. If you bought coins at different prices or sold partial amounts, then you have to keep track and record the difference of what you sold. Cryptocurrency exchanges are not required to provide a 1099-B or summary tax statement for cryptocurrency transactions. Its your responsibility to keep records of your transactions. The most common way to do this is to download your order or trading history from your exchanges website. You may need to do this a few times throughout the year due to limits on how far back you can get information.

Once you have your figures:

There's an upload limit of 250 cryptocurrency transactions in TurboTax. If you have more than that, youll need a transaction aggregator. Well walk you through that in the cryptocurrency section.

https://youtu.be/UxAa89MPiCw

L3aOfh9nvp_cg_tto_us_lc_na_question:L3aOfh9nv_US_en_US

See more here:
How and where do I report Cryptocurrency coin-to-coin ...

Read More..

Quantum computing will break your encryption in a few …

Modern public-key encryption is currently good enough to meet enterprise requirements, according to experts. Most cyberattacks target different parts of the security stack these days unwary users in particular. Yet this stalwart building block of present-day computing is about to be eroded by the advent of quantum computing within the next decade, according to experts.

About 99% of online encryption is vulnerable to quantum computers, said Mark Jackson, scientific lead for Cambridge Quantum Computing, at the Inside Quantum Technology conference in Boston on Wednesday.

Quantum computers those that use the principles of quantum entanglement and superposition to represent information, instead of electrical bits are capable of performing certain types of calculation orders of magnitude more quickly than classical, electronic computers. Theyre more or less fringe technology in 2019, but their development has accelerated in recent years, and experts at the IQT conference say that a spike in deployment could occur as soon as 2024.

Lawrence Gasman, president of IQT, compared the current state of quantum computing development to that of fiber-optic networking in the 1980s a technology with a lot of promise, but one still missing one or two key pieces.

Optical amplifiers were what got optical networking going, he said. Without them, theyd really have never turned into what they are today.

Pure research, the military, and the financial sector are the prime movers behind quantum computing in general and quantum security in particular, according to Gasman. The latter, in particular, has been an enthusiastic early adopter of the technology.

If you look at the amount of money lost to credit card fraud, thats a huge driver, he noted.

A shift to either different types of classical encryption some algorithms have proven to be resistant to quantum computing or to quantum computing-based security is going to be necessary.

Quantum computing-based security technology is effective because it relies on two of the best-known properties of quantum physics the idea that observing a particle changes its behavior, and that paired or entangled particles share the same set of properties as the other.

What this means, in essence, is that both parties to a message can share an identical cipher key, thanks to quantum entanglement. In addition, should a third party attempt to eavesdrop on that sharing, it would break the symmetry of the entangled pairs, and it would be instantly apparent that something fishy was going on.

If everything is working perfectly, everything should be in sync. But if something goes wrong, it means youll see a discrepancy, said Jackson.

Its like a soap bubble, according to Brian Lowy, vice president at ID Quantique SA, a Switzerland-based quantum computing vendor mess with it and it pops.

At some point, youre going to have to factor [quantum computing], he said, noting that, even now, bad actors could download encrypted information now, planning to crack its defenses once quantum computing is equal to the task.

The precise day of the shift will vary by industry, according to Paul Lucier, vice president of sales and business development at quantum computing security vendor Isara.

Devices that have short usage life like smartphones arent in immediate danger, because quantum security technology ought to be sufficiently miniaturized by the time quantum codebreaking is powerful enough to undercut modern public-key encryption.

Its verticals like the automotive industry and the infrastructure sector that have to worry, Lucier said. Anything with a long service life and anything thats expensive to repair and replace is potentially vulnerable.

Thats not to say that its time to rip-and-replace immediately. Standards bodies are expected to approve quantum-safe encryption algorithms at around the same time experts are predicting that quantum-powered decryption threatens modern security, so a hybrid approach is possible.

But the threat is very real, so much so that the National Quantum Initiative Act became law in December of last year. The act calls for official advisory groups to be formed by the executive branch, and directs research funding for further exploration of quantum computing technology.

So be prepared, the experts at the IQT conference all agreed.

We think by 2026, if youre not ready with your systems prepared, youre taking a giant risk, said Lucier.

Continue reading here:
Quantum computing will break your encryption in a few ...

Read More..

Microsoft has formed a coalition to promote quantum computing …

Microsoft and some big research institutions are hoping to turn the Pacific Northwest into a hotbed for quantum computing.

On Monday, Microsoft Quantum, the company's research team devoted to the field, announced that it's getting together with the Pacific Northwest National Laboratory and the University of Washington to form a coalition called the Northwest Quantum Nexus. The coalition plans to promote the development of quantum computing in the Pacific Northwest region, as well as in parts of Canada.

The partners are also hosting a two-day summit at the University of Washington on Monday and Tuesday that will bring together researchers and officials from universities, government agencies, and businesses. The goal is to encourage attendees to collaborate on quantum-computing projects and research.

"We're really at a moment when many businesses are starting to think about the promise of quantum information sciences and the promise of quantum computing for solving the world's most challenging problems," Krysta Svore, general manager of quantum software at Microsoft told Business Insider.

Standard computers such as PCs and smartphones process and store information in the form of binary bits, either zeros or ones. Quantum computers, by contrast, process and store data as "qubits," which can hold the values of zero and one simultaneously. That design difference could allow them to perform exponentially more calculations in a given amount of time than traditional computers, giving them the potential to solve immensely more complex problems.

Because of that, quantum computing is considered one of the most promising new technologies, with potential applications in areas ranging from discovering new drugs to cryptography to making stock predictions to calculating more efficient routes for airlines or the military. But the technology is still in its early stages, and analysts don't expect quantum computers to outperform traditional ones for another five to ten years.

Read more:Quantum computing could change everything, and IBM is racing with Microsoft, Intel, and Google to conquer it. Here's what you need to know

In December, Congress passed and the president signed the National Quantum Initiative Act, which provides $1.2 billion for research in the field. Since then, there's been increased interest from government agencies and businesses, said Nathan Baker, a director at the Pacific Northwest National Laboratory.

Krysta Svore, general manager of quantum software at Microsoft, is helping lead the company's efforts in the field. Microsoft "The Northwest is known for its outstanding physics and outstanding work in computing," Baker said. "We need to be thinking about how can we deliberately move it forward to do something bigger."

Although business and investor interest in quantum computing is growing, there's a shortage of people with skills in the field, Svore and Baker said. That's something they hope the Northwest Quantum Nexus will help address.

"There's a huge gap between quantum information sciences and all of the skills you need to bring together to make it a functioning technological platform," Baker said. "We're going to have to be deliberate in how to build that out."

In addition to helping form the Nexus coalition, Microsoft and the University of Washington are teaming up to teach students how to program quantum computers.

"Microsoft's focus is producing a scalable quantum computer and bringing that forward for our customers and for our future," Svore said. "To do that, we need to be able to accelerate the progress in quantum computing. We need to be able to educate a whole world of quantum developers."

Microsoft is developing both quantum computing hardware and software. Its effort focuses on fragmenting electrons to store information in multiple places at once.

That's different from the approach of companies such as IBM, Intel and Google, which are working on creating quantum computers that store data using superconducting circuits.

"Having devoted my life to this field, I'm overwhelmingly giddy with the prospect of the type of output we'll see with the Northwest Quantum Nexus Summit," Svore said. "I really do believe this can start the quantum revolution."

Read the original post:
Microsoft has formed a coalition to promote quantum computing ...

Read More..

Authenticated encryption – Wikipedia

Authenticated encryption (AE) and authenticated encryption with associated data (AEAD) are forms of encryption which simultaneously assure the confidentiality and authenticity of data. These attributes are provided under a single, easy to use programming interface.

The need for AE emerged from the observation that securely combining separate confidentiality and authentication block cipher operation modes could be error prone and difficult.[1][2] This was confirmed by a number of practical attacks introduced into production protocols and applications by incorrect implementation, or lack of authentication (including SSL/TLS).[3]

Around the year 2000, a number of efforts evolved around the notion. In particular, strong interest in these modes was sparked by the publication of Charanjit Jutla's IACBC and IAPM modes[4] in 2000. Six different authenticated encryption modes (namely OCB2.0, Key Wrap, CCM, EAX, Encrypt-then-MAC (EtM), and GCM) have been standardized in ISO/IEC 19772:2009.[5] More were developed in response to NIST solicitation.[6] Sponge functions can be used in duplex mode to provide authenticated encryption.[7]

A typical programming interface for AEmode implementation would provide the following functions:

The header part is intended to provide authenticity and integrity protection for networking or storage metadata for which confidentiality is unnecessary, but authenticity is desired.

In addition to protecting message integrity and confidentiality, authenticated encryption can provide security against chosen ciphertext attack. In these attacks, an adversary attempts to gain an advantage against a cryptosystem (e.g., information about the secret decryption key) by submitting carefully chosen ciphertexts to some "decryption oracle" and analyzing the decrypted results. Authenticated encryption schemes can recognize improperly-constructed ciphertexts and refuse to decrypt them. This in turn prevents the attacker from requesting the decryption of any ciphertext unless he generated it correctly using the encryption algorithm, which would imply that he already knows the plaintext. Implemented correctly, this removes the usefulness of the decryption oracle, by preventing an attacker from gaining useful information that he does not already possess.

Many specialized authenticated encryption modes have been developed for use with symmetric block ciphers. However, authenticated encryption can be generically constructed by combining an encryption scheme and a message authentication code (MAC), provided that:

Bellare and Namprempre (2000) analyzed three compositions of these primitives, and demonstrated that encrypting a message and subsequently applying a MAC to the ciphertext (the Encrypt-then-MAC approach) implies security against an adaptive chosen ciphertext attack, provided that both functions meet the required properties. Katz and Yung investigated the notion under the name "unforgeable encryption" and proved it implies security against chosen ciphertext attacks.[8]

In 2013, a competition was announced to encourage design of authenticated encryption modes.[9]

AEAD is a variant of AE where the data to be encrypted needs both authentication and integrity as opposed to just integrity. AEAD binds associated data (AD) to the ciphertext and to the context where it's supposed to appear, so that attempts to "cut-and-paste" a valid ciphertext into a different context are detected and rejected.

It is required, for example, by network packets. The header needs integrity, but must be visible; payload, instead, needs integrity and also confidentiality. Both need authenticity.

The plaintext is first encrypted, then a MAC is produced based on the resulting ciphertext. The ciphertext and its MAC are sent together. Used in, e.g., IPsec.[10] The standard method according to ISO/IEC 19772:2009.[5] This is the only method which can reach the highest definition of security in AE, but this can only be achieved when the MAC used is "strongly unforgeable".[11] In November 2014, TLS and DTLS extension for EtM has been published as RFC 7366. Various EtM ciphersuites exist for SSHv2 as well (e.g. hmac-sha1-etm@openssh.com).

A MAC is produced based on the plaintext, and the plaintext is encrypted without the MAC. The plaintext's MAC and the ciphertext are sent together. Used in, e.g., SSH.[12] Even though the E&M approach has not been proved to be strongly unforgeable in itself,[11] it is possible to apply some minor modifications to SSH to make it strongly unforgeable despite the approach.[citation needed]

A MAC is produced based on the plaintext, then the plaintext and MAC are together encrypted to produce a ciphertext based on both. The ciphertext (containing an encrypted MAC) is sent. Used in, e.g., SSL/TLS.[13] Even though the MtE approach has not been proven to be strongly unforgeable in itself,[11] the SSL/TLS implementation has been proven to be strongly unforgeable by Krawczyk who showed that SSL/TLS was in fact secure because of the encoding used alongside the MtE mechanism.[14][dubious discuss] Despite the theoretical security, deeper analysis of SSL/TLS modeled the protection as MAC-then-pad-then-encrypt, i.e. the plaintext is first padded to the block size of the encryption function. Padding errors often result in the detectable errors on the recipient's side, which in turn lead to padding oracle attacks, such as Lucky Thirteen.

Continue reading here:
Authenticated encryption - Wikipedia

Read More..

Bitcoin Price Today – Live Bitcoin Value – Charts & Market …

Last year everyone was going bonkers for Bitcoin, and thats no surprise, seeing as how the number one cryptocurrency had an absolutely explosive price performance in 2017. Things have cooled off in 2018 as prices fell significantly, however many are still bullish about Bitcoins long-term potential.

To that end, the scarce, deflationary quality of Bitcoin makes it totally unlike traditional fiat currencies, which are usually prone to inflation and even hyperinflation in the worst of cases. That means as more investments pour into BTC, its price will likely continue to see upward pressure because there will be no supply response.

Think about how when the price of oil surges, more companies begin producing oil, which then increases the supply and acutely deflates the price of oil accordingly.

No similar supply response can never happen with bitcoins. There will never be more than ~21 million, and even contemporary estimations say more than 3 million BTC have been lost for good, making BTC considerably scarcer than many realize.

That means the BTC could potentially shoot up exponentially in future years. But how high?Lets take a look at some of the more prominent projections weve seen thrown around in recent days.

Once renowned for being a prominent Wall Street hedge fund manager, Mike Novogratz has now set his sights on the cryptocurrency space, and hes not turning back. Running the crypto-based Galaxy Investment Partners, Novogratz is betting big on the Bitcoin boom in general as his mid-term BTC price projection suggests.

Bitcoin could be at $40,000 at the end of 2018, Novogratz said. It easily could.

And for Novogratz, theres no confusion as to why that particular price point may end up really materializing. In a November 30th interview on Fox Business, Novogratz unabashedly declared that Bitcoin is going mainstream.

And Novogratz knows what mainstream and institutional looks like; he used to run a Goldman Sachs trading desk in Asia before becoming a hedge fund manager at Fortress. If he thinks the herd is coming, as it were, then we all best pay attention.

Going much more long-term, Novogratz said it was within the realm of possibility that the bitcoin market cap could one day reach the current market cap of gold, which is around a whopping $8 trillion USD.

If this reality were to materialize down the road, that would put each BTC around the $390,000 price point.

Firebrand Bitcoin pundit Max Keiser has never made his love for BTC and its potential a secret.

As such, youll commonly find him on Twitter making new price predictions based on the Bitcoin booms momentum.

For now, hes pegging his short-term bitcoin price target at $15,000. Thats a reasonable figure, to be sure, especially with BTCs parabolic price performance in Q3 and Q4 2017.

Beyond that, though, Keiser has his eye set on the impressive $100,000 BTC price milestone.

Love him or hate him, Adam Back is an OG cypherpunk whos made incalculable contributions to the cryptocurrency space as a whole. Theres a reason Satoshi Nakamoto reached out to Back (and Wei Dai) first in starting up Bitcoin.

In other words, Backs been around the block once or twice. He knows the ecosystem as well as anyone.

And its his opinion that the next major target for the bitcoin price to hit is $100,000, echoing Max Keisers aforementioned prediction.

In a recent tweet, Back even went as far to say that users should be careful selling bitcoin in 2018 because the price could rocket so acutely over the next 12 months that people wouldve made considerably more by just holding.

John McAfee is best known as the creator of the popular McAfee antivirus software. Hes also become a Bitcoin aficionado over the past several months, and he never hesitates to voice his opinions on the cryptocurrency craze accordingly.

And his opinions are exceedingly bullish, to say the least. McAfee was projecting $500,000 BTC in 2020 just a few weeks ago, but he modified his claim to be even more bold as bitcoins market surge has been moving faster than he anticipated.

Now, McAfee thinks $1 million per bitcoin will be reality by the end of 2020. Thats almost an unfathomable possibility at the moment, but maybe we havent seen anything yet. Especially if institutional interest keeps exploding.

But McAfee has even bolder ideas, to be sure. In an even newer Twitter exchange, McAfee explained that he believes the BTC price could reach into the billions one day.

Specifically, the tens of billions as he argues:

Thats certainly the most aggressive price prediction anyones made for BTC yet. But if that insane price materializes, McAfee will end up looking like even more of a madman genius than he already is.

Swedish Pirate Party founder Rick Falkvinge is a big proponent of Bitcoin Cash (BCH), going so far as to sarcastically call himself the CEO of Bitcoin Cash.

But that doesnt mean he doesnt respect the beast that BTC is and could be.

Bitcoin] can easily go to more than $1 million per bitcoin. Falkvinge said during a recent interview. But thats just Falkvinges conservative estimate. Hes actually more bullish than that, asserting that BTC can go as high as $5 million:

If cryptocurrency fulfills its promise, and theres no indication it wouldnt, then the equivalent of one bitcoin needs to be in the $2-5 million dollar range.

The cryptocurrency expert and venture capitalist, Tim Draper, has also given its opinion about the future price of Bitcoin. According to him bitcoin and blockchain technology are one of the best things that happened for businesses.

Mr Draper said in 2014 that Bitcoin could reach $10,000 in just three years, something that happened in 2017, exactly on the date he predicted. When he explained that bitcoin could reach that price ($10,000), the cryptocurrency was traded just at $413 dollars.

At the same time, he said that in the future Bitcoin could keep growing. About that, he is convinced that the cryptocurrency is the future and that the virtual currency market will gain its place among fiat currencies.

Bitcoin is the future currency. Why would I sell the future for the past? Why would I go and grab some weird fiat subject to the will of some governments? he commented during an interview with Bloomberg.

The world market for cryptocurrencies is 6 trillion dollars, and I think that that it will be crypto. And I am really excited about all the extraordinary things that can happen because of crypto and bitcoin.

Cameron Winklevoss is one of the two popular Winklevoss twins. The co-founder of the cryptocurrency exchange Gemini, stated that bitcoin could be worth 40 times its current value.

In order to explain why bitcoin could grow up to 40 times, he compared the cryptocurrency market capitalization with the market cap of gold.

During an interview with CNBC he said:

So if you look at a $100 billion market cap today, now last week it might have been more like 200, so its actually a buying opportunity, we think that theres a potential appreciation of 30 to 40 times because you look at the gold market today, its a $7 trillion market. And so a lot of people are starting to se that, they recognize the store of value properties.

He has also said that due to the fact that bitcoin has a fixed supply, it is still a very underappreciated asset. Indeed, he stated that he and his brother believe that bitcoin disrupts gold.

The Winklevoss twins emphasized that they will not sell their bitcoins even if the price surpasses $380,000 dollars. This is a special number, because if bitcoin reaches this price level, its market capitalization will be equal to golds market valuation.

An important portfolio manager that worked for more than six years in the cryptocurrency world, predicted this year that Bitcoin could reach $50,000 dollars. While speaking at the World Economic Forum in Davos, he brought some calm to the cryptocurrency market. Bitcoin could definitely see $50,000 in 2018.

At the moment of the statement, Bitcoin was traded over $11,000, days later it reached the lowest point in months when it was displayed in cryptocurrency exchanges under $6,000 dollars.

But Mr Singh said that the kind of volatility that bitcoin experienced is not unusual nor unexpected. And thats confirmed when we pay attention to the charts. In the past, Bitcoin suffered important corrections in just a few days.

Mr Singh commented:

If you look at Microsoft of Apple when they went public their stocks were very volatile because the market wasnt mature. There are not so many vendors right now who can accept cryptocurrencies but theres huge adoption on the black market.

Cryptocurrency adoption keeps growing all over the world. In past articles we wrote that enterprises are investing in blockchain technologies and virtual currencies. Businesses all around the world, including small shops and merchants, are adopting bitcoin and other currencies as a means of payment.

If the adoption trend continues, bitcoin could lead the market towards new all time highs. Additionally, payment processors are working with cryptocurrencies trying to spread their benefits.

Lets get really speculative just for the purposes of illustration the growth thats possible in the coming years.

The current market cap of all global stock markets is around $100 trillion USD. Woah, right? Accordingly, lets say that the entire cryptocurrency market one day reaches this $100 trillion cap.

And lets also say that BTC maintains its current position as hovering around a 50 percent share of the entire crypto market (though, of course, theres no reason to believe itll stay at 50 percent forever).

That would put Bitcoin as having around a $50 trillion market cap. At this point, all we need is to divide $50 trillion by the number of bitcoins in existence.

Lets go with 17 million instead of 21 million since many bitcoins have been lost already.

Alas: $50 trillion divided by 17 million = ~$2,941,176. Round up, and thats $3 million per bitcoin.

Now, we cant count our eggs before theyve hatched. Theres still quite the mountain to climb for the crypto market to get even close to hitting $100 trillion. But maybe its possible in 30 or 40 years. Maybe not at all.

Its going to be a wild ride no matter what happens between now and then, that much is for sure.

Here is the original post:
Bitcoin Price Today - Live Bitcoin Value - Charts & Market ...

Read More..

Suite of Crypto Services to Leverage Nasdaq Framework …

Nasdaq and Bcause have announced that a suite of new cryptocurrency services will be offered via the Nasdaq Financial Framework. These services include crypto mining and custody solutions, as well as spot and derivatives trading. They are expected to attract a broad range of users including a new breed of investors wanting to participate in the growing cryptocurrency marketplace.

Also read: SEC Chair Explains Key Upgrades Needed for Bitcoin ETF Approval

Nasdaq Inc. and Bcause Llc announced on Wednesday that a suite of crypto services will leverage Nasdaqs technology, elaborating:

Bcauses markets will operate on Nasdaqs matching engine, clearing and market surveillance technology via the Nasdaq Financial Framework platform.

The Nasdaq Financial Framework consists of a single operational core that ties together the deep portfolio of Nasdaqs proven business functionality across the trade lifecycle, in an open framework, the company detailed.

Launched last year with a mining facility in Virginia Beach, Virginia, Bcause is building what it calls a full-stack cryptocurrency ecosystem which it also claims to be the worlds first. According to the announcement, the services to be offered via Nasdaqs framework are all parts of the digital currency value chain, from a custody solution to the mining facility in Virginia Beach, to spot trading for digital assets, to a futures market and derivatives clearinghouse. The technology is expected to go live in the first half of this year with the launch of the Bcause spot cryptocurrency market.

In addition, Bcause revealed that it has filed with the U.S. Commodity Futures Trading Commission (CFTC) to become a designated contract market (DCM) and to establish a derivative clearing organization (DCO). The CFTC website describes that DCMs may list for trading futures or option contracts based on any underlying commodity, index or instrument.

Wednesdays announcement further states:

Once derivatives trading and clearing officially commence, Bcause will be the only venue to serve as a one-stop shop for all parts of the digital currency value chain: from the state-of-the-art digital mining facility launched in February 2018, to spot trading for digital assets, to a futures market and derivatives clearinghouse which are pending regulatory approval.

Nasdaq explained that its market technology is already being used by broker-dealers, exchanges, clearinghouses, central securities depositories and regulators in over 50 countries. In February, the bourse began tracking the prices of BTC and ETH with real-time price data.

Nasdaq also offers a digital asset surveillance technology, which it believes will help Bcause monitor its markets for manipulative activities and misconduct to benefit the security of the crypto spot and derivatives markets.

I fully expect that our markets will attract a broad range of users, Bcause CEO Fred Grede expressed, from those who are already quite active in the financial markets and familiar with Nasdaq technology, to a new breed of investors wanting to participate in the growing cryptocurrency marketplace. Paul McKeown, Nasdaqs Senior VP and Head of Marketplace Operators and New Markets, Market Technology, commented:

By leveraging the Nasdaq Financial Framework, Bcause will have the scalability and modular functionality to introduce new micro-services and expand its business offerings to meet industry demands and the evolution of the digital assets economy.

What do you think of this new suite of crypto services leveraging Nasdaqs technology? Let us know in the comments section below.

Images courtesy of Shutterstock.

Need to calculate your bitcoin holdings? Check our tools section.

A student of Austrian Economics, Kevin found Bitcoin in 2011 and has been an evangelist ever since. His interests lie in Bitcoin security, open-source systems, network effects and the intersection between economics and cryptography.

Go here to see the original:
Suite of Crypto Services to Leverage Nasdaq Framework ...

Read More..

Email Encryption Options for MDaemon Email Server

MDaemon uses a layered approach to email encryption for safely sending your emails and attachments. On the client-side, MDaemon Webmail users can enable basic encryption features when sending emails and attachments within Webmail. On the server-side, Administrators have the ability to use encryption, decryption, and basic key management capabilities.

MDaemon Webmail uses HTTPS connections to power its webmail encryption

MDaemon supports Open PGP to power its server-side email encryption

When composing a message, MDaemon Webmail users can use the Advanced Options screen to instruct MDaemon to encrypt the message, retrieve their public key, or retrieve the public key of another user (if available). This greatly simplifies the process of sending secure, encrypted email using MDaemon PGP.

On the server side, OpenPGP for MDaemon has been added to give administrators the ability to use encryption, decryption, and basic key management capabilities through OpenPGP support.

This additional layer helps administrators who want to ensure user compliance by managing encryption settings at the server versus the user implemented client level. Also, MDaemon's Content Filter now contains actions to encrypt and decrypt messages. And finally, server-side encryption capabilities are beneficial when using email archiving with MDaemon.

MDaemon Webmail has a unique setting that allows it to be used as basic public key server. When this feature is enabled, Webmail will honor requests for your users' public keys using a specially formatted URL. Additionally, MDaemon's OpenPGP feature supports collection of public keys over DNS. This helps to automate the process of exchanging encryption keys.

MDaemon's OpenPGP features can verify embedded signatures found within messages. This helps the recipient ensure that the message is authentic. MDaemon Webmail will display an icon or text label for verified messages. Webmail will also display labels for messages with valid DKIM signatures, messages decrypted by OpenPGP, and messages signed with an OpenPGP key.

Automated Encryption Key Exchange allows the process of exchanging public keys for OpenPGP to take place during the SMTP message delivery process. When this feature is enabled, authorized users will no longer need to manually send their public key to another user from whom they wish to receive encrypted email.

Visit link:
Email Encryption Options for MDaemon Email Server

Read More..

ZOOM Web Hosting and Domain Registration Philippines is a …

ZOOM Domain Registration and Cloud, SSD Web Hosting Philippines gives business the advantage of getting the benefit of real cloud SSD web hosting platform for the price of traditional shared web servers or VPS hosting. Unlike other website hosting and domain registration companies with servers that run mostly on Centos, our Cloud platform are powered by CloudLinux, the only OS designed to optimize web server performance in a cloud environment. This means that spikes from one tenant doesnt affect other tenants making each account stable and running smoothly.

Zoom Hosting is also the preferred .PH domain registration offering registration of all .PH domains including, .com.ph, .net.ph, .org.ph, edu.ph, .gov.ph. We are not reseller who sells cheap web hosting, dedicated server, VPS and email hosting reseller packages and oversells resources sacrificing speed and security. We maintain and manage our own servers thus were able to tweak server settings according to our customers needs and were able to give them a more personalized service.

Dont just take our word for it, try it now and experience the best, lightning fast cloud web hosting today! Dedicated Cloud-based VPS and Dedicated server also available.

See original here:
ZOOM Web Hosting and Domain Registration Philippines is a ...

Read More..

Quantum computing for everyone | Michael Nielsen

Can you give me a simple, concrete explanation of how quantum computers work?

Ive been asked this question a lot. I worked on quantum computing full time for 12 years, wrote 60 or so papers, and co-authored the standard text. But for many years the question stumped me. I had several pat answers, but none really satisfied me or my questioners.

It turns out, though, that there is a satisfying answer to the question, which anyone can understand if theyre willing to spend some time concentrating hard.

To understand the answer, lets back up and think first about why big media outlets like the New York Times and the Economist regularly run stories about quantum computers.

The reason is that quantum computer scientists believe quantum computers can solve problems that are intractable for conventional computers. That is, its not that quantum computers are like regular computers, but smaller and faster. Rather, quantum computers work according to principles entirely different than conventional computers, and using those principles can solve problems whose solution will never be feasible on a conventional computer.

In everyday life, all our experience is with objects which can be directly simulated by a conventional computer. We dont usually think about this fact, but movie-makers rely on it, and we take it for granted special effects are basically just rough computer simulations of events that would be more expensive for the movie makers to create in real life than they are to simulate inside a computer. Much more detailed simulations are used by companies like Boeing to test designs for their latest aircraft, and by Intel to test designs for their latest chips. Everything youve ever seen or done in your life driving a car, walking in the park, cooking a meal all these actions can be directly simulated using a conventional computer.

Because of this, when we think in concrete terms we invariably think about things that can be directly simulated on a conventional computer.

Now, imagine for the sake of argument that I could give you a simple, concrete explanation of how quantum computers work. If that explanation were truly correct, then it would mean we could use conventional computers to simulate all the elements in a quantum computer, giving us a way to solve those supposedly intractable problems I mentioned earlier.

Of course, this is absurd! Whats really going on is that no simple concrete explanation of quantum computers is possible. Rather, there is an intrinsic quantum gap between how quantum computers work, and our ability to explain them in simple concrete terms. This quantum gap is what made it hard for me to answer peoples requests for a concrete explanation. The right answer to such requests is that quantum computers cannot be explained in simple concrete terms; if they could be, quantum computers could be directly simulated on conventional computers, and quantum computing would offer no advantage over such computers. In fact, what is truly interesting about quantum computers is understanding the nature of this gap between our ability to give a simple concrete explanation and whats really going on.

This account of quantum computers is distinctly at odds with the account that appears most often in the mainstream media. In that account, quantum computers work by exploiting what is called quantum parallelism. The idea is that a quantum computer can simultaneously explore many possible solutions to a problem. Implicitly, such accounts promise that its then possible to pick out the correct solution to the problem, and that its this which makes quantum computers tick.

Quantum parallelism is an appealing story, but its misleading. The problem comes in the second part of the story: picking out the correct solution. Most of the time this turns out to be impossible. This isnt just my opinion, in some cases you can mathematically prove its impossible. In fact, the problem of figuring out how to extract the solution, which is glossed over in mainstream accounts, is really the key problem. Its here that the quantum gap lies, and glossing over it does nothing to promote genuine understanding.

None of my discussion to now actually explains how quantum computers work. But its a good first step to understanding, for it prepares you to expect a less concrete explanation of quantum computers than you might at first have hoped for. I wont give a full description here, but I will sketch whats going on, and give you some suggestions for further reading.

Quantum computers are built from quantum bits, or qubits [1], which are the quantum analogue of the bits which make up conventional computers. Heres a magnified picture of a baby quantum computer made up of three Beryllium atoms, which are used to store three qubits:

The atoms are held in place using an atom trap, which you cant see because its out of frame, but which surrounds the atoms, holding them suspended in place using electric and magnetic fields, similar to the way magnets can be used to levitate larger objects in the air.

The atoms in the picture are about three micrometers apart, which means that if you laid a million end to end, they wouldnt quite span the length of a living room. Very fine human hair is about 20 micrometers in diameter itd pretty much cover the width of this photo.

The atoms themselves are about a thousand times smaller than the spacing between the atoms. They look a lot bigger in the picture, and the reason is interesting. Although the atoms are very small, the way the picture was created was by shining laser light on the atoms to light them up, and then taking a photograph. The particles making up the laser light are much bigger than the atoms, which makes the picture come out all blurry; the photo above is basically a very blurry photograph of the atoms, which is why they look so much bigger than they really are.

I called this a baby quantum computer because it has only three qubits, but in fact its pretty close to the state of the art. Its hard to build quantum computers, and adding extra qubits turns out to be tricky. Exactly who holds the record for the most qubits depends on who you ask, because different people have different ideas about what standards need to be met to qualify as a genuine quantum computer. The current consensus for the record is about 5-10 qubits.

Okay, a minor alert is in order. Ive tried to keep this essay as free from mathematics as possible, but the rest of the essay will use a little high-school mathematics. If this is the kind of thing that puts you off, do not be alarmed! You should be able to get the gist even if you skip over the mathematical bits.

How should we describe whats inside a quantum computer? We can give a bare-bones description of a conventional computer by listing out the state of all its internal components. For example, its memory might contains the bits 0,0,1,0,1,1, and so on. It turns out that a quantum computer can also be described using a list of numbers, although how this is done is quite different. If our quantum computer has n qubits (in the example pictured above n = 3), then it turns out that the right way to describe the quantum computer is using a list of 2n numbers. Its helpful to give these numbers labels: the first is s1, the second s2, and so on, so the entire list is:

What are these numbers, and how are they related to the n qubits in our quantum computer? This is a reasonable question in fact, its an excellent question! Unfortunately, the relationship is somewhat indirect. For that reason, Im not going to describe it in detail here, although you can get a better picture from some of the further reading I describe below. For us, the thing to take away is that describing n qubits requires 2n numbers.

One result of this is that the amount of information needed to describe the qubits gets big really quickly. More than a million numbers are needed to describe a 20-qubit quantum computer! The contrast with conventional computers is striking a conventional 20-bit computer needs only 20 numbers to describe it. The reason is that each added qubit doubles the amount of information needed to describe the quantum computer [2]. The moral is that quantum computers get complex far more quickly than conventional computers as the number of components rises.

The way a quantum computer works is that quantum gates are applied to the qubits making up the quantum computer. This is a fancy way of saying that we do things to the qubits. The exact details vary quite a bit in different quantum computer designs. In the example I showed above, it basically involves manipulating the atoms by shining laser light on them. Quantum gates usually involve manipulating just one or two qubits at a time; some quantum computer designs involve more at the same time, but thats a luxury, its not actually necessary. A quantum computation is just a sequence of these quantum gates done in a particular order. This sequence is called a quantum algorithm; it plays the same role as a program for a conventional computer.

The effect of a quantum gate is to change the description s1, s2, of the quantum computer. Let me show you a specific example to make this a bit more concrete. Theres a particular type of quantum gate called a Hadamard gate. This type of gate affects just one qubit. If we apply a Hadamard gate to the first qubit in a quantum computer, the effect is to produce a new description for the quantum computer with numbers t1, t2, given by

t1 = (s1+s2n/2+1)/ 2

t2 = (s2+s2n/2+2)/ 2,

t3 = (s3+s2n/2+3)/ 2,

and so on, down through all 2n different numbers in the description. The details arent important, the salient point is that even though weve manipulated just one qubit, the way we describe the quantum computer changes in an extremely complicated way. Its bizarre: by manipulating just a single physical object, we reshuffle and recombine the entire list of 2n numbers!

Its this reshuffling and recombination of all 2n numbers that is the heart of the matter. Imagine we were trying to simulate whats going on inside the quantum computer using a conventional computer. The obvious way to do this is to track the way the numbers s1, s2, change as the quantum computation progresses. The problem with doing this is that even a single quantum gate can involve changes to all 2n different numbers. Even when n is quite modest, 2n can be enormous. For example, when n = 300, 2n is larger than the number of atoms in the Universe. Its just not feasible to track this many numbers on a conventional computer.

You should now be getting a feeling for why quantum computer scientists believe it is infeasible for a conventional computer to simulate a quantum computer. Whats really clever, and not so obvious, is that we can turn this around, and use the quantum manipulations of all these exponentially many numbers to solve interesting computational problems.

I wont try to tell that story here. But if youre interested in learning more, heres some reading you may find worthwhile.

In an earlier essay I explain why conventional ways of thinking simply cannot give a complete description of the world, and why quantum mechanics is necessary. Going a little further, an excellent lay introduction to quantum mechanics is Richard Feynmans QED: The Strange Theory of Light and Matter. It requires no mathematical background, but manages to convey the essence of quantum mechanics. If youre feeling more adventurous still, Scott Aaronsons lecture notes are a fun introduction to quantum computing. They contain a fair bit of mathematics, but are written so you can get a lot out of them even if some of the mathematics is inaccessible. Scott and Dave Bacon run excellent blogs that occasionally discuss quantum computing, and their blogrolls are a good place to find links to other quantum bloggers.

Finally, if youve enjoyed this essay, you may enjoy some of my other essays, or perhaps like to subscribe to my blog. Thanks for reading!

Thanks to Jen Dodd and Kate Nielsen for providing feedback that greatly improved early drafts of this essay.

Michael Nielsen is a writer living near Toronto, and working on a book about The Future of Science. If youd like to be notified when the book is available, please send a blank email to the.future.of.science@gmail.com with the subject subscribe book. Youll be emailed to let you know when the book is to be published; your email address will not be used for any other purpose.

[1] Ben Schumacher, who coined the term qubit, runs an occasional blog.

[2] Motivated by this observation, in my PhD thesis I posed a tongue-in-cheek quantum analogue of Moores Law: to keep pace with conventional computers, quantum computers need only add a single qubit every two years. So far, things are neck and neck.

Read more here:
Quantum computing for everyone | Michael Nielsen

Read More..

Hundreds of Millions in Cryptocurrency Vanishes After …

(Newser) A CEO's untimely death, hard-to-crack passwords, and up to $190 million in missing cryptocurrency. These all underlie a mystery that Fortune calls the "implosion of Quadriga" after the December death of the QuadrigaCX coin exchange's chief, Gerald Cotten, at the age of 30, and now the FBI and Royal Canadian Mounted Police are reportedly involved. Cotten allegedly died in India of Crohn's disease complications, and he was the only one with access to the accounts of 115,000 Quadriga customersbut he apparently didn't leave his passwords with anyone, including his widow. The auditor Ernst & Young did manage to eventually get into the exchange, but it did so to a shocking find: All the digital wallets were cleaned out, per the BBC, which notes most of the funds were originally thought to be in "cold storage," meaning they weren't supposed to be accessible via the internet.

However, the E&Y report found 14 user accounts Cotten had "created outside the normal process," and CoinDesk poked around the transaction records and found indications someone moved the missing currency to "hot wallets" on other exchanges. Some even wonder if Cotten faked his own death, per Fortune. The upshot for Quadriga customers, per reporter Amy Castor, who offers a timeline of what happened with the exchange: "All of your money is gone." There's a $100,000 reward on the missing funds from Kraken, another cryptocurrency exchange, whose CEO, Jesse Powell, wants to both help his own customers who lost money through Quadriga and also keep the reputation of the cryptocurrency market overall intact. "I ... think you've got to get the family and staff and shareholders in a room for a few hours of interrogation to get to the bottom of what's going on," he tells Fortune. (Read more cryptocurrency stories.)

Go here to see the original:
Hundreds of Millions in Cryptocurrency Vanishes After ...

Read More..